Evaluation systems and methods for coordinating software agents
First Claim
Patent Images
1. A method comprising:
- associating a first mobile agent with a first security policy and a second mobile agent with a second security policy;
associating one or more cores from at least one of the first mobile agent or the second mobile agent to be configured to simultaneously support at least a suite of applications;
evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy, the evaluating including(a) requesting the indication of the first security policy;
(b) distilling from the received message at least an affirmative indication as one or more of the indication of the first security policy or the indication of the second security policy;
(c) determining the indication of the second security policy responsive to the obtained identifier of the second mobile agent; and
(d) transmitting a yes-or-no decision of whether to enable a triggering circuit in response to the indication of the second security policy;
deploying at least the first mobile agent remotely via the second mobile agent, andat least one of the associating or the evaluating is performed at least partially using one or more processing devices.
5 Assignments
0 Petitions
Accused Products
Abstract
A device, method, computer program product, and network subsystem are described for associating a first mobile agent with a first security policy and a second mobile agent with a second security policy or for providing a first agent with code for responding to situational information about the first agent and about a second agent and for evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy or for deploying the first agent.
117 Citations
27 Claims
-
1. A method comprising:
-
associating a first mobile agent with a first security policy and a second mobile agent with a second security policy; associating one or more cores from at least one of the first mobile agent or the second mobile agent to be configured to simultaneously support at least a suite of applications; evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy, the evaluating including (a) requesting the indication of the first security policy; (b) distilling from the received message at least an affirmative indication as one or more of the indication of the first security policy or the indication of the second security policy; (c) determining the indication of the second security policy responsive to the obtained identifier of the second mobile agent; and (d) transmitting a yes-or-no decision of whether to enable a triggering circuit in response to the indication of the second security policy; deploying at least the first mobile agent remotely via the second mobile agent, and at least one of the associating or the evaluating is performed at least partially using one or more processing devices. - View Dependent Claims (2, 3, 4, 5, 6, 7, 27)
-
-
8. A first method comprising:
-
performing a reception of or a transmission of one or more instructions relating to a second method including; associating a first mobile agent with a first security policy and a second mobile agent with a second security policy; associating one or more cores from at least one of the first mobile agent or the second mobile agent to be configured to simultaneously support at least a suite of applications; evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy, the evaluating including (a) requesting the indication of the first security policy; (b) distilling from the received message at least an affirmative indication as one or more of the indication of the first security policy or the indication of the second security policy; (c) determining the indication of the second security policy responsive to the obtained identifier of the second mobile agent; and (d) transmitting a yes-or-no decision of whether to enable a triggering circuit in response to the indication of the second security policy; deploying at least the first mobile agent remotely via the second mobile agent, and at least one of the reception, the transmission, the associating, or the evaluating is performed at least partially using one or more processing devices. - View Dependent Claims (9)
-
-
10. A network subsystem comprising:
-
association means for associating a first mobile agent with a first security policy and a second mobile agent with a second security policy; association means for associating one or more cores from at least one of the first mobile agent or the second mobile agent to be configured to simultaneously support at least a suite of applications; deployment means for deploying at least the second security policy to the first mobile agent; and
evaluation means for evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy, the evaluation means including(a) means for requesting the indication of the first security policy; (b) means for distilling from the received message at least an affirmative indication as one or more of the indication of the first security policy or the indication of the second security policy; (c) means for determining the indication of the second security policy responsive to the obtained identifier of the second mobile agent; and (d) means for transmitting a yes-or-no decision of whether to enable a triggering circuit in response to the indication of the second security policy; and means for deploying at least the first mobile agent remotely via the second mobile agent.
-
-
11. A network subsystem comprising:
-
means for associating a first mobile agent with a first security policy and a second mobile agent with a second security policy; means for one or more cores from at least one of the first mobile agent or the second mobile agent to be configured to simultaneously support at least a suite of applications; means for evaluating a received message at least in response to an indication of the first security policy and to an indication of the second security policy, the means for evaluating including (a) means for requesting the indication of the first security policy; (b) means for distilling from the received message at least an affirmative indication as one or more of the indication of the first security policy or the indication of the second security policy; (c) means for determining the indication of the second security policy responsive to the obtained identifier of the second mobile agent; and (d) means for transmitting a yes-or-no decision of whether to enable a triggering circuit in response to the indication of the second security policy; and means for deploying at least the first mobile agent remotely via the second mobile agent. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
Specification